The rise of technology has brought with it many benefits but also the potential for great dangers. In
particular, Information Communication Technology (ICT) is involved in many facets of life-influencing
systems, which ...

A challenge faced when simulating the complex behaviour of cloth, especially at interactive frame rates, is maintaining an acceptable level of realism while keeping computation time to a minimum. A common method used to ...

The topic for this dissertation is the optimisation of computer programs, as they are being
compiled, using discrete optimisation techniques. The techniques introduced aim to
optimise the runtime performance of ...

The introduction of new portable sensors that monitor physiological systems
in the human body has allowed quality of life and medical diagnostic applications
to be taken directly to the user, without the constraints of ...

This dissertation presents a method for learning from existing building designs and generating new building layouts. Generating fully furnished building layouts could be very useful for video games or for assisting architects ...

A company’s valuable information assets face many risks from internal and external sources. When these risks are exploited and reports on information assets are made public, it is usually easy to determine which companies ...

The discussions presented in this dissertation have been undertaken in answer to the need for securing the intellectual assets stored on computer systems. Computer vulnerabilities and their influence on computer systems ...

This dissertation details the implementation of SNAP, a stochastic network analysis package, as the basis of an in-house computer configuration planning facility. The work was performed at Head Office, Gold Fields of South ...

The STSP (symmetric travelling salesman problem) involves finding the
cheapest tour through a number of cities. It is a difficult problem and until
recently algorithms for the TSP could not find the optimal tour in ...

Agent technology has become more common in mainstream applications as it allows systems to perform routine operations without input from human users. The current evolution of the internet and the increasingly distributed ...

This dissertation investigates the feasibility of creating real-time three-dimensional images, using data obtained from satellites. The aim is to enhance satellite imaging applications, by utilizing the normal 3-D visual ...

Due to the correspondence between the role abstraction
in Role-based Access Control (RBAC) and the notion
of organizational positions, it seems easy to construct
role hierarchies. This is, however, a misconception. ...

In this thesis we will investigate the development of Critical Information Infrastructure
Protection (CIIP) structures in the developing world. Developing regions
are experiencing fast-paced development of information ...

Since the emergence of electronic communication, scientists have strived to make these
communication systems as secure as possible. Classical cryptographical methods
provided secrecy, with the proviso that the courier ...

This
study
has its origin in the
growing
need for
information
systems to be classified as
'secure'.
With the
increasing
use
of
Computer
Aided
Software
Engineering
(CASE)
tools
in
the design
of
applic ...

Vehicle traffic congestion on Gauteng’s metropolitan and national roads in South Africa remains a challenge, especially during peak hours and also when incidents occur. They hamper the flow of vehicle traffic. Traffic ...

We are living in an increasingly complex world in which much of society is dependent on technology
and its various offshoots and incarnations (Rogers & Siegfried, 2004). There is ample evidence of the
influence of ...